Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Chrome 148 Released with Fix for 127 Security
May 7, 2026
Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy
May 7, 2026
Phishing Attack: Event Invites Steal Your Login Credentials
May 7, 2026
Home/CyberSecurity News/PoC Exploit Targets Nginx-UI Backup Restore Public Released
CyberSecurity News

PoC Exploit Targets Nginx-UI Backup Restore Public Released

A critical security flaw, identified as CVE-2026-33026, has emerged within the Nginx-UI backup restore mechanism. This vulnerability allows threat actors to tamper with encrypted backup archives and...

Emy Elsamnoudy
Emy Elsamnoudy
April 2, 2026 3 Min Read
2 0

A critical security flaw, identified as CVE-2026-33026, has emerged within the Nginx-UI backup restore mechanism.

This vulnerability allows threat actors to tamper with encrypted backup archives and inject malicious configurations during the restoration process.

With a public Proof-of-Concept (PoC) exploit now available, unpatched deployments are at immediate risk of full system compromise.

Cryptographic Flaw Exploit Mechanics and PoC

The root cause of this vulnerability lies in a severely flawed circular trust model within the application’s backup architecture.

When Nginx-UI generates a backup, it compresses the files into ZIP archives and encrypts them using AES-256-CBC. However, the system fails to maintain a trusted root of trust.

Instead of securing the encryption parameters server-side, the AES key and Initialization Vector (IV) are provided directly to the client as a backup security token.

Furthermore, the integrity metadata file, which contains the SHA-256 hashes of the encrypted files, is encrypted using this same key.

Because the attacker possesses the key, they can easily bypass all cryptographic security controls.

Adding to the severity, the restore process fails to enforce strict integrity verification, allowing restoration operations to proceed even when hash mismatches trigger system warnings.

Security researcher ‘dapickle’ successfully demonstrated how this architectural weakness can be weaponized.

The publicly released PoC includes Python scripts that automate the decryption and rebuilding of the Nginx-UI backup files.

An attacker begins by generating a standard backup and extracting the security token from the HTTP headers.

Using a decryption script, they unpack the archive and modify the internal configuration file (app.ini). A common attack vector involves injecting a malicious command, such as StartCmd = bash, into the configuration.

The attacker then uses a rebuilding script to compress the modified files, calculate new legitimate-looking hashes, update the metadata, and re-encrypt the entire bundle using the original token.

When this tampered backup is uploaded to the Nginx-UI restore interface, the system blindly accepts it and executes the injected payload.

Generate a backup and extract the security token (Source: Github)
Generate a backup and extract the security token (Source: Github)

Impact and Regression

This vulnerability carries a Critical severity rating, earning maximum CVSS 4.0 scores across multiple impact metrics.

Successful exploitation allows attackers to tamper with application configurations permanently, insert backdoors into Nginx routing, and achieve arbitrary command execution on the host machine.

Notably, this flaw is a regression of a previously reported vulnerability documented in the GitHub advisory GHSA-fhh2-gg7w-gwpq.

While an earlier patch addressed unauthorized access to backup files, it completely failed to resolve the underlying cryptographic design issue, leaving the system fundamentally vulnerable to archive modifications.

The system accepts the modified backup (Source: Github)
The system accepts the modified backup (Source: Github)

The security community has categorized the underlying weaknesses under multiple classifications, including improper validation of integrity check values (CWE-354) and failure to verify cryptographic signatures (CWE-347) properly.

The vulnerability impacts the Go-based Nginx-UI package, specifically versions 2.3.3 and earlier. To mitigate this critical threat, administrators must immediately upgrade to the patched release, version 2.3.4.

Beyond simply applying the latest patch, developers are advised to implement a server-side trusted integrity root. This involves signing backup metadata using a private key rather than relying on client-exposed tokens.

Furthermore, systems must be securely configured to avoid circular trust models and strictly abort the restore operation if any hash verification fails.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Magecart Hijacks eStore Checkouts, Stealing Hackers Uses

Next Post

Microsoft Teams Will Strip EXIF Data From Shared Images

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us